1
JAIIB – PRINCIPLES OF BANKING - MODULE C
- “BANKING TECHNOLOGY”
Dr.Firdos T.Shroff,Jt.Director (Academics),IIBF, Mumbai
MODEL ‘MULTIPLE CHOICE QUESTIONS (MCQs)’
1) A flaw in a program that causes it to produce incorrect or inappropriate results is called a ----
A) Byte
B) Attribute
C) Unit Problem
D) Bug
2) The term ‘WAN’ stands for –
A) World Area Network
B) Wide Area Network
C) World Application Net
D) Wide Application Network
3) A collaborative network that uses Internet Technology to link business with their suppliers is ---
A) Internet
B) Intranet
C) Extranet
D) WAN
4) ‘PIN’ in Smart Card is called ---
A) Permanent Index Number
B) Personal Identification Number
C) Personal Index Number
D) Permanent Identification Number
5) ‘MICR’ technology used for clearance of cheques by banks refers to -----
A) Magnetic Ink Character Recognition
B) Magnetic Intelligence Character Recognition
C) Magnetic Information Cable Recognition
D) Magnetic Insurance Cases Recognition
6) “Buy Now – Pay Now” is commonly used for ---
A) Debit Cards
B) Vault Cards
C) Credit Cards
D) E-purse
7) Open Systems Interconnection (OSI) Model consists of ----
A) 5-layers
B) 6-layers
C) 7-layers
D) 8-layers
8) Internet is ----
A) Network of LAN
B) Network of ATMs
C) Network of ALPMs
D) Network of Networks
9) A passive threat to computer security is -----
A) Malicious Intent
B) Sabotage
C) Accidental Errors
D) Espionage Agent
10) A MODEM is connected in between a telephone line and a -----
A) Network
B) Computer
C) Communication Adapter
D) Serial Port
11) A leased line can transmit –
A) Only Data / Text
B) Only Voice
C) Only Video
D) All the above
12) The primary communication protocol on Internet is --
A) IPX
B) NETBIOS
C) TCP/IP
D) EPBX
13) The technique is used to produce a “fingerprint” of a message as a part of digital signing –
A) Scrambling
B) Extracting
C) Hashing
D) Condensing
14) Smart Card is –
A) Special purpose Cards
B) Microprocessor Cards
C) Processing unit contains memory for storing data
D) Processing unit for software handling
15) The word “FTP’ stands for -----
A) File Translate Protocol
B) File Transit Protocol
C) File Typing Protocol
D) File Transfer Protocol
16) A collection of raw facts is called ------
A) Output
B) Information
C) Bits
D) Data
17) The term ‘HTML’ connotes –
A) Hyper Text Markup Language
B) Hyper Transcription Markup Language
C) High Text Markup Language
D) High Terminal Markup Language
18) Threats of physical damage to the hardware is from -----
A) Natural Calamities
B) Power Fluctuations
C) Electro Magnetic Effects
D) Magnetic Devices
19) The network interface card of LAN is related to following layer of OSI Model ---
A) Transport
B) Network
C) Data Link
D) Physical
20) A result of a computer virus cannot lead to ----
A) Disk Crash
B) Mother Board Crash
C) Corruption of program
D) Deletion of files
21) Firewalls are used to protect against ----
A) Unauthorised Attacks
B) Virus Attacks
C) Data Driven Attacks
D) Fire Attacks
22) The highest percentage of victims of computer crime are in ------
A) Banks
B) Commercial Users
C) Government
D) University
23) The ------converts digital signals to analog signals for the purpose of transmitting data over telephone lines
A) Modem
B) Router
C) Gateway
D) Bridge
24) The ------directory is mandatory for every disk
A) Root
B) Base
C) Sub
D) Case
25) Smallest storage unit of a computer is ---
A) Bit
B) Byte
C) Nibble
D) Pixel
26) ‘SQL’ stands for –
A) Sequential Query Language
B) Sequence Queue Language
C) Sequential Quote Language
D) Sequel Quarry Language
27) BANKNET comprises of the following Standard –
A) CCT X.25
B) CCITT X.25
C) CCITT X..286
D) CCIIT X.486
28) COMET stands for –
A) Composition of Message Trial
B) Computerised Miscellaneous Transfer
C) Computerised Message Transfer
D) Composition of Mutilation Text
29) ‘Multiplexing’ means –
A) a technique to enable more than one signal to be sent simultaneously over one physical channel
B) a technique to enable one signal over one channel
C) a technique to enable one signal over many channels
D) a technique to enable one signal over multiple channels
30) For scientific applications most useful language is –
A) COBOL
B) FORTRAN
C) SQL
D) HTML
31) Payroll System is essentially –
A) Online
B) Batch Processing
C) Real Time
D) Transaction processing
32) The term ‘TCP/IP’ stands for –
A) Transmission Control Protocol/Internet Protocol
B) Transit Control Protocol/Internal Protocol
C) Transfer Concept Protocol/Intermediate Protocol
D) Transit Concept Protocol/Interval Protocol
33) ----- means the altering of computer system software to achieve a task for which it was not originally designed
A) Pegging
B) Hacking
C) Trekking
D) Breaking
34) The word ‘ISDN’ stands for –
A) Internal Service Digit Network
B) Integrated Services Digital Network
C) Information Service Digital Net
D) Internal Server Digit Network
35) Bio-metric Recognition does not include –
A) Finger Print and Palm Print
B) Voice Print and Eye Retina
C) Hand Geometry and Typing Rhythm
D) Body Print and Head print
36) The following cannot be done by virus ---
A) Loss of Data
B) Deletion of File
C) Physical Damage to Keyboard
D) Corruption of Program
37) Memory Management through ‘Paging’ is controlled by –
A) OS
B) CPU
C) RAM
D) ROM
38) RSA stands for the following three scientists –
A) Rivest, Shamir and Adleman
B) Ronallad, Sussan and Assamann
C) Rueppel, Selfridge and Albert
D) Regis, Schroeer and Anderson
39) HTML tag ------
A) <P>
B) <-
C) ->
D) dir
40) Adobe Page Mill is ----
A) Browser
B) Authoring Tool
C) Workflow
D) Scripting Language
@@@@@@@@@